Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks

Several new attacks have been identified in CRNs such as primary user emulation, dynamic spectrum access (DSA), and jamming attacks. Such types of attacks can severely impact network performance, specially in terms of the over all achieved network throughput. In response to that, intrusion detection system (IDS) based on anomaly and signature detection is recognized as an effective candidate solution to handle and mitigate these types of attacks. In this paper, we present an intrusion detection system for CRNs (CR-IDS) using the anomaly-based detection (ABD) approach. The proposed ABD algorithm provides the ability to effectively detect the different types of CRNs security attacks. CR-IDS contains different cooperative components to accomplish its desired functionalities which are monitoring, feature generation and selection, rule generation, rule based system, detection module, action module, impact analysis and learning module. Our simulation results show that CR-IDS can detect DSA attacks with high detection rate and very low false negative and false positive probabilities.

[1]  Mee Hong Ling,et al.  Trust and reputation management in cognitive radio networks: a survey , 2014, Secur. Commun. Networks.

[2]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[3]  Shamik Sengupta,et al.  Vulnerabilities in cognitive radio networks: A survey , 2013, Comput. Commun..

[4]  Alexandros G. Fragkiadakis,et al.  Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection , 2015, Wirel. Commun. Mob. Comput..

[5]  Song Han,et al.  Cognitive radio network security: A survey , 2012, J. Netw. Comput. Appl..

[6]  Yang Liao,et al.  A jury-based trust management mechanism in distributed cognitive radio networks , 2015 .

[7]  Miguel Soriano,et al.  Securing cognitive radio networks , 2010 .

[8]  Nora Cuppens-Boulahia,et al.  Advanced Reaction Using Risk Assessment in Intrusion Detection Systems , 2007, CRITIS.

[9]  Nora Cuppens-Boulahia,et al.  Automated reaction based on risk analysis and attackers skills in intrusion detection systems , 2008, 2008 Third International Conference on Risks and Security of Internet and Systems.

[10]  Beongku An,et al.  Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information , 2016, 2016 International Conference on Electronics, Information, and Communications (ICEIC).

[11]  Cheng Li,et al.  The security in cognitive radio networks: a survey , 2009, IWCMC.

[12]  Anjali Agarwal,et al.  A survey on security in Cognitive Radio networks , 2014, 2014 6th International Conference on Computer Science and Information Technology (CSIT).

[13]  Wei-Ping Zhu,et al.  Energy efficient optimization for physical layer security in cognitive relay networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[14]  Danda B. Rawat,et al.  Recent security issues on cognitive radio networks: A survey , 2016, SoutheastCon 2016.

[15]  H. B. Barlow,et al.  Unsupervised Learning , 1989, Neural Computation.

[16]  Salvatore J. Stolfo,et al.  A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.

[17]  Salim Hariri,et al.  Anomaly-based Protection Approach against Wireless Network Attacks , 2007, IEEE International Conference on Pervasive Services.

[18]  Jeffrey H. Reed,et al.  Case Study: Security Analysis of a Dynamic Spectrum Access Radio System , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[19]  Chen Gang,et al.  A SDN-based energy saving strategy in wireless access networks , 2015, China Communications.

[20]  Álvaro Araujo,et al.  PUE attack detection in CWSNs using anomaly detection techniques , 2013, EURASIP J. Wirel. Commun. Netw..

[21]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[22]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[23]  Ferenc Szidarovszky,et al.  Multi-Level Intrusion Detection System (ML-IDS) , 2008, 2008 International Conference on Autonomic Computing.

[24]  Zhu Han,et al.  Interference Improves PHY Security for Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.

[25]  Salim Hariri,et al.  Anomaly-Based Behavior Analysis of Wireless Network Security , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[26]  Eleazar Eskin,et al.  A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .

[27]  Mahmoud Al-Ayyoub,et al.  Software defined framework for multi-cell Cognitive Radio Networks , 2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[28]  S. M. Kamruzzaman,et al.  Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks , 2014, 2014 IEEE International Symposium on Multimedia.

[29]  J. Morris Chang,et al.  A layered approach to cognitive radio network security: A survey , 2014, Comput. Networks.

[30]  Haythem Bany Salameh,et al.  Efficient Resource Allocation for Multicell Heterogeneous Cognitive Networks With Varying Spectrum Availability , 2016, IEEE Transactions on Vehicular Technology.

[31]  Yenumula B. Reddy,et al.  Security Issues and Threats in Cognitive Radio Networks , 2013 .

[32]  Lijun Qian,et al.  Anomalous spectrum usage attack detection in cognitive radio wireless networks , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).

[33]  Edmundo Monteiro,et al.  A survey on security attacks and countermeasures with primary user detection in cognitive radio networks , 2015, EURASIP J. Inf. Secur..

[34]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[35]  Danda B. Rawat,et al.  Analyzing energy efficient physical layer security in large-scale MIMO enabled CRN with QoS requirements , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[36]  Salim Hariri,et al.  A proactive wireless self-protection system , 2008, ICPS '08.

[37]  Hannes Federrath,et al.  Laribus: privacy-preserving detection of fake SSL certificates with a social P2P notary network , 2013, 2013 International Conference on Availability, Reliability and Security.

[38]  Haythem Bany Salameh,et al.  A Batch-Based MAC Design With Simultaneous Assignment Decisions for Improved Throughput in Guard-Band-Constrained Cognitive Networks , 2016, IEEE Transactions on Communications.

[39]  James B. D. Joshi,et al.  Security in Dynamic Spectrum Access Systems: A Survey , 2009 .

[40]  Larry J. Greenstein,et al.  ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks , 2009, IEEE INFOCOM 2009.

[41]  Ferenc Szidarovszky,et al.  A game theory based risk and impact analysis method for Intrusion Defense Systems , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.

[42]  Zhiyong Feng,et al.  A survey of security issues in Cognitive Radio Networks , 2015 .

[43]  K. J. Ray Liu,et al.  Optimal Defense against Jamming Attacks in Cognitive Radio Networks Using the Markov Decision Process Approach , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[44]  Yu Liu,et al.  Multiwave: A novel vehicle steering pattern detection method based on smartphones , 2016, 2016 IEEE International Conference on Communications (ICC).

[45]  Ajith Abraham,et al.  Rule-Based Expert Systems , 2005 .

[46]  Young-Koo Lee,et al.  An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.